1- # SDX Security Edge
1+ # SDX Edge server
22
3- The SDX Security Edge chart deploys the following components:
3+ The SDX Edge chart deploys the following components:
44
55- Kong Data Plane
66- Fluentbit
77- Prometheus
88- Cert Renewal Job
9+ - Cert Bootstrap Job
910
1011On Openshift environments, the Kong Data Plane is a passthrough from the Openshift HAProxy.
1112
@@ -24,23 +25,17 @@ helm push sdx-edge-0.1.0.tgz oci://ghcr.io/bcgov/aps-devops
2425
2526## Deployment
2627
27- > ` TOKEN ` is a one-time-use token for calling the CA to get a new client certificate for mTLS and signing
28-
29- In your working directory, create the following structure:
30-
31- - ` tls.crt ` : TLS certificate from a public CA
32- - ` tls.key ` : TLS certificate key from a public CA
28+ > ` TOKEN ` is a one-time-use token for calling the CA to get a new certificate for mTLS and signing
3329
3430``` sh
35- export DOMAIN=" sdx.gov.bc.ca"
36- export EDGE_ID=" sdxgov"
31+ export IP=" <INTERNET_FACING_IP]"
32+ export EDGE_ID=" <EDGE NAME>"
33+ export DOMAIN=" ${EDGE_ID} .servers.sdx"
3734
3835helm upgrade --install ${EDGE_ID} \
39- --set-file tls.ca=sdx_ca.crt \
40- --set-file tls.server.crt=tls.crt \
41- --set-file tls.server.key=tls.key \
4236 --set tls.client.bootstrap.token=$TOKEN \
43- --set tls.client.cn=${EDGE_ID} .edge.sdx \
37+ --set tls.client.cn=${DOMAIN} \
38+ --set tls.server.ip=${IP} \
4439 --set route.host=${DOMAIN} \
45- oci://ghcr.io/bcgov/aps-devops/sdx-edge:0.1.0
40+ oci://ghcr.io/bcgov/aps-devops/sdx-edge:0.1.0
4641```
0 commit comments